Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A randomized parallel algorithm for Voronoi diagrams based on symmetric convex distance functions.. Discrete Applied Mathematics, 109 (1-2): 177-196 (2001)Datenschutz bei Windows 2000., and . Datenschutz und Datensicherheit, (2002)Improved Cryptanalysis of MISTY1.. FSE, volume 2365 of Lecture Notes in Computer Science, page 61-75. Springer, (2002)Secure Data Management in Trusted Computing., , , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 324-338. Springer, (2005)Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures., , , and . Sicherheit, volume P-128 of LNI, page 97-109. GI, (2008)Playful Technology-Mediated Audience Participation in a Live Music Event., , , , , , , , , and . CHI PLAY (Companion), page 437-443. ACM, (2017)Cryptographic Attack Metrics., , and . Dependability Metrics, volume 4909 of Lecture Notes in Computer Science, page 133-156. Springer, (2005)Auf dem Weg zu neuen Hashfunktionen - Ein Wettbewerb., and . Datenschutz und Datensicherheit, 31 (8): 596-601 (2007)Lokale Eigenschaften in der algorithmischen Geometrie mit Anwendungen in der Parallelverarbeitung.. Universität Münster, (1998)On Security Protocols for Desktop Sharing.. Sicherheit, volume P-170 of LNI, page 229-240. GI, (2010)